CVE-2024-36930NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
OSV6.5
EPSS
0.0%
top 95.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 30
Latest updateAug 13

Description

In the Linux kernel, the following vulnerability has been resolved: spi: fix null pointer dereference within spi_sync If spi_sync() is called with the non-empty queue and the same spi_message is then reused, the complete callback for the message remains set while the context is cleared, leading to a null pointer dereference when the callback is invoked from spi_finalize_current_message(). With function inlining disabled, the call stack might look like this: _raw_spin_lock_irqsave from comple

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages7 packages

Patches

🔴Vulnerability Details

6
OSV
linux-lowlatency, linux-raspi vulnerabilities2024-08-13
OSV
linux-azure vulnerabilities2024-08-13
OSV
linux-oem-6.8 vulnerabilities2024-08-12
OSV
linux-nvidia-lowlatency, linux-oracle vulnerabilities2024-08-09
OSV
linux, linux-aws, linux-gcp, linux-gke, linux-ibm, linux-nvidia, linux-nvidia-6.8 vulnerabilities2024-08-08

📋Vendor Advisories

7
Ubuntu
Linux kernel vulnerabilities2024-08-13
Ubuntu
Linux kernel (OEM) vulnerabilities2024-08-12
Ubuntu
Linux kernel vulnerabilities2024-08-09
Ubuntu
Linux kernel vulnerabilities2024-08-08
Red Hat
kernel: spi: fix null pointer dereference within spi_sync2024-05-30

💬Community

1
Bugzilla
CVE-2024-36930 kernel: spi: fix null pointer dereference within spi_sync2024-06-03